Date: Fri, 19 Feb 2010 08:47:50 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request: kernel information leak via userspace USB interface On 02/19/2010 12:53 AM, Steven M. Christey wrote: > > On Thu, 18 Feb 2010, Marcus Meissner wrote: > >> Are we considering "giving desktop local users unintended rights" >> a security issue or not? > > from a CVE purist perspective, if the security model is that "users with > physical access should not be able to read portions of kernel memory" > then a violation of that is technically a vulnerability, even if the > attack complexity is high - assuming that there isn't already some > easier way that the attacker can get the same results through legitimate > means. Being able to crash the system by plugging in a USB device (for > example) is about as easy as the defenestration exploit - i.e. throwing > the computer out the window - so in that case I wouldn't view it as a > vulnerability. If someone with physical access can read the kernel > memory that's being leaked, if don't already own the box, that seems a > little more like a vulnerability to me. Thanks for clarifying! Eugene -- Eugene Teo / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ